Search results for "violations"

showing 10 items of 11 documents

European Union Protection of Human Rights through its global policy

2022

The Regime of Restrictive Measures against Serious Violations and Abuses of Human Rights launched at the end of 2020 by the European Union is part of the Commission's objective to reaffirm the Union's firm commitment to promoting universal values and strengthening its leadership in this field. However, the first year of implementation of the regime casts doubt on its effectiveness, given the existence of legal loopholes that tarnish it.

Sociology and Political Sciencerestrictive measuresPolitical Science and International Relationsserious violations and abusesEuropean UnionUNESCO::CIENCIAS JURÍDICAS Y DERECHOhuman rightsLawThe Age of Human Rights Journal
researchProduct

The European Court of Human Rights (ECtHR) vis-à-vis amnesties and pardons : factors concerning or affecting the degree of ECtHR’s deference to states

2022

States have adopted amnesties/pardons concerning serious human rights violations to transition from crises, dictatorships, or conflicts worldwide, including Europe. Although the ECtHR has yet to review amnesties/pardons directly, it has increasingly decided on the effects of amnesties/pardons on the rights of individuals. Thus, the main research question herein is to identify which factors may determine whether and to what extent the ECtHR defers to states regarding amnesties/pardons in cases of serious human rights violations, namely, factors concerning or affecting the degree of ECtHR’s deference to states in these cases. Based on ECtHR’s jurisprudence on amnesties/pardons, this article a…

Sociology and Political ScienceEuroopan ihmisoikeussopimusdeference to statesamnestiesarmahdusEuropean Court of Human Rightskansainvälinen oikeusLawihmisoikeusloukkauksetpardonsserious human rights violations
researchProduct

Measurement of the jet fragmentation function and transverse profile in proton-proton collisions at a center-of-mass energy of 7 TeV with the ATLAS d…

2011

The jet fragmentation function and transverse profile for jets with 25 GeV<pT jet<500 GeV and |ηjet|<1.2 produced in proton–proton collisions with a center-of-mass energy of 7 TeV are presented. The measurement is performed using data with an integrated luminosity of 36 pb−1. Jets are reconstructed and their momentum measured using calorimetric information. The momenta of the charged particle constituents are measured using the tracking system. The distributions corrected for detector effects are compared with various Monte Carlo event generators and generator tunes. Several of these choices show good agreement with the measured fragmentation function. None of these choices reproduce both t…

Physics and Astronomy (miscellaneous)Atlas detectorMonte Carlo methodKinematics7. Clean energy01 natural sciencesScaling ViolationsHigh Energy Physics - ExperimentScatteringHigh Energy Physics - Experiment (hep-ex)jet fragmentation[PHYS.HEXP]Physics [physics]/High Energy Physics - Experiment [hep-ex]Nuclear ExperimentPhysicsSettore FIS/01 - Fisica SperimentaleDetectorATLASCharged particleTransverse planePhysical SciencesQuarkFísica nuclearDistributionsLHCParticle Physics - ExperimentParticle physics530 PhysicsCiências Naturais::Ciências FísicasAstrophysics::High Energy Astrophysical Phenomena:Ciências Físicas [Ciências Naturais]jet fragmentation function; proton–proton collisions; ATLAS detectorFOS: Physical sciencesAnnihilationddc:500.2530Nuclear physicsQ2 Dependence0103 physical sciencesFragmentation functionFysikddc:530High Energy Physics010306 general physicsEngineering (miscellaneous)Ciencias ExactasHeraScience & TechnologyATLAS detector010308 nuclear & particles physicsFísicaQCDproton-proton collisionsHigh Energy Physics::Experiment
researchProduct

Revisiting neutralization theory and its underlying assumptions to inspire future information security research

2022

Over two decades ago, neutralization theory was introduced to information systems research from the field of criminology and is currently emerging as an influential foundation to both explain and solve the information security policy noncompliance problem. Much of what we know about the theory focuses exclusively on the neutralization techniques identified in the original as well as subsequent criminological writings. What is often left unexamined in IS research is the underlying assumptions about the theory’s core elements; assumptions about the actor, the act, the normative system, and the nature of neutralizing itself. The objective of this commentary is to revisit the origin of neutrali…

underlying assumptionsohjeettyöntekijättietoturvapolitiikkaneutralization theoryneutralointiteoriatietoturvakyberturvallisuusISP violationstietojärjestelmät
researchProduct

Open dialogue as a human rights-aligned approach

2019

Throughout the last 20 years, the human rights perspective has increasingly developed into a paradigm against which to appraise and evaluate mental health care. This article investigates to what extent the Finnish open dialogue (OD) approach both aligns with human rights and may be qualified to strengthen compliance with human rights perspectives in global mental health care. Being a conceptual paper, the structural and therapeutic principles of OD are theoretically discussed against the background of human rights, as framed by the Universal Declaration of Human Rights, the UN Convention on the Rights of People with Disabilities, and the two recent annual reports of the Human Rights Council…

lcsh:RC435-571media_common.quotation_subjectDeclarationCoercionCrisis ; Mental health ; Promotion ; Universal ; ViolationsCompliance (psychology)Power (social and political)03 medical and health sciences0302 clinical medicineGlobal mental healthlcsh:PsychiatryPolitical scienceConceptual AnalysisLaw and economicsmedia_commonPsychiatryHuman rightsuniversalpromotionMental health030227 psychiatryPsychiatry and Mental healthcrisisviolations030217 neurology & neurosurgeryAutonomymental health
researchProduct

Voltage-Based Droop Control of Electric Vehicles in Distribution Grids under Different Charging Power Levels

2021

If left uncontrolled, electric vehicle charging poses severe challenges to distribution grid operation. Resulting issues are expected to be mitigated by charging control. In particular, voltage-based charging control, by relying only on the local measurements of voltage at the point of connection, provides an autonomous communication-free solution. The controller, attached to the charging equipment, compares the measured voltage to a reference voltage and adapts the charging power using a droop control characteristic. We present a systematic study of the voltage-based droop control method for electric vehicles to establish the usability of the method for all the currently available resident…

TechnologyControl and Optimizationbusiness.product_categoryComputer science020209 energyEnergy Engineering and Power Technology02 engineering and technologyAutomotive engineeringlaw.inventionDemand responseHardware_GENERALControl theorylawElectric vehicle0202 electrical engineering electronic engineering information engineeringdistribution gridsVoltage droopElectrical and Electronic EngineeringTransformerEngineering (miscellaneous)electric vehiclesdemand side managementRenewable Energy Sustainability and the EnvironmentTvoltage-based droop control021001 nanoscience & nanotechnologyGridVDP::Teknologi: 500demand responsevoltage violations0210 nano-technologybusinessVoltage referenceEnergy (miscellaneous)VoltageEnergies
researchProduct

Effects of Sanctions, Moral Beliefs, and Neutralization on Information Security Policy Violations Across Cultures

2020

A principal concern of organizations is the failure of employees to comply with information security policies (ISPs). Deterrence theory is one of the most frequently used theories for examining ISP violations, yet studies using this theory have produced mixed results. Past research has indicated that cultural differences may be one reason for these inconsistent findings and have hence called for cross-cultural research on deterrence in information security. To address this gap, we formulated a model including deterrence, moral beliefs, shame, and neutralization techniques and tested it with the employees from 48 countries working for a large multinational company. peerReviewed

deterrencekansainväliset yrityksetinformation securityshameorganisaatiottietoturvapolitiikkaneutralizationrikkomuksetmoraalikulttuurienvälinen tutkimusnational culturekulttuurierotmoral beliefsinformation security policy violationstietoturvakansallinen kulttuuri
researchProduct

The taint of torture and the brazilian legal system

2019

In Brazil, the practice of torture intertwines deeply with its own history. The literature on the subject has had a greater intensification on its registers during the Dictatorial Regime (1964 to 1985). In spite of the Brazilian Constitution of 1988, Brazil only makes efforts to investigate the crimes of torture of this period to comply with the provisions of the United Nations in 2011. Within this scenario, the NationalTruth Commission (Law 12.528, of November 2011) was created with the purpose of clarifying the facts and circumstances of cases concerning human rights violations, as well as the Law on Access to Information (Law 12.527 of November 2011), which have regulated the constitutio…

Orden legal 37 491137-7038 8537 Arxius de sociologia 525290 2019 40 7038138 The taint of torture and the brazilian legal system De Góes BrennandEdna GusmãoTortureas well as the Law on Access to Information (Law 12.527 of November 2011)of November 2011) was created with the purpose of clarifying the facts and circumstances of cases concerning human rights violationssuch as tortureespecially because they were perpetrated by agents of the State. This article aims to present part of the research undertaken to understand the official legal procedures to prevent the practice of acts of torture in the national territory and how they are understood in the Brazilian legal systemUNESCO::SOCIOLOGÍADelamar José In Brazilwas created the Network Studies and Research on Violence-RIEV in partnership with Federal University of Paraíba-UFPB and Federal University of Santa Catarina-UFSC with the objective of investigating violations of human rights during the dictatorship1997 that criminalizes torture. ViolenceLegal orderthe practice of torture intertwines deeply with its own history. The literature on the subject has had a greater intensification on its registers during the Dictatorial Regime (1964 to 1985). In spite of the Brazilian Constitution of 1988Brazil only makes efforts to investigate the crimes of torture of this period to comply with the provisions of the United Nations in 2011. Within this scenariowhich have regulated the constitutional right to access public informationVolpato Dutrawith special attention to Law 9.455:SOCIOLOGÍA [UNESCO]the NationalTruth Commission (Law 12.528of April 7ViolenciaTorturavalid for all areas of the public administration. These laws allowed the opening of the archives of the dictatorship until denied on the basis of a severely restricted access. In this contextpersecution and violations of the right-to-live. The study of these violations is of fundamental importance for the historical unveiling of this period
researchProduct

Caur mobilo aplikāciju iegūtās informācijas izmantošana administratīvo pārkāpumu lietās

2017

Darba mērķis ir izpētīt caur mobilo aplikāciju iegūtas informācijas izmantošanu pierādīšanas procesā administratīvo pārkāpumu lietās un tādas informācijas attiecināmību, pieļaujamību un ticamību. Pētījuma rezultātā autors ir izdarījis secinājumus par pierādījumu jēdzienu, pierādījumu īpašībām un pētījuma ietvaros tiek secināts, ka, situācijā, ja lietā nav citu pierādījumu, kuri apstiprinātu pierādīšanas priekšmetā ietilpstošu faktu esamību, caur mobilo aplikāciju iegūtās informācijas ticamība ir apšaubāma. Lai šīs šaubas novērstu, nepieciešams iegūt papildus pierādījumus.

reliabilityevidenceadministrative violationadministratīvais pārkāpumsLatvian Administrative Violations CodeJuridiskā zinātne
researchProduct

Culture and perceptions of power in teacher-student communication

2011

The objective of this study was to find out if national culture impacts the phenomenon of power as it is found in teacher-student communication at the University of Jyväskylä. The study is pertinent and relevant because of the increasingly rapid internationalization that is happening in the Finnish higher education system. Understanding aspects of intercultural teacher-student communication will be important for the future. A qualitative research process was chosen for this study and the data was collected by conducting in-depth interviews with 10 international students. They were asked about their experiences, perceptions and feelings while communicating with Finnish professors. Analysis a…

powerteacher-studentexpectancy violationsintercultural communicationkulttuurienvälinen viestintäopettaja-oppilassuhde
researchProduct